SlideShare a Scribd company logo
Copyright EC-Council 2020. All Rights Reserved.​
Threat Intelligence Data
Collection & Acquisition
Open Source Intelligence (OSINT)
Human Intelligence (HUMINT)
Cyber Counterintelligence (CCI)
Indicators of Compromise (IoCs)
Malware Analysis
Threat Intelligence Data Collection Methodology
Search Engines
Web Services
Website Footprinting
Emails
Whois Lookup
DNS Interrogation
Automating OSINT effort
Threat Data Collection
Through Open Source
Intelligence (OSINT)
Social Engineering Tools
Threat Data Collection through Human Intelligence
(HUMINT)
Human-based Social Engineering Techniques
Interviewing and Interrogation
Threat Data Collection through Cyber
Counterintelligence (CCI)
Honeypots
Passive DNS Monitoring
Pivoting Off Adversary’s Infrastructure
Malware Sinkholes
YARA Rules
External IoCs
Internal IoCs
Custom-built IoCs
Threat Data
Collection Through
Indicators of
Compromise (IoCs)
Threat Data Collection Through
Malware Analysis
Static Malware Analysis Dynamic Malware Analysis
To Learn More, Visit: www.eccouncil.org/cyber-threat-
intelligence

More Related Content

PDF
Cyber Threat Intelligence
PDF
Threat Intelligence Workshop
PPTX
Cyber Threat Intelligence
PPTX
6 Steps for Operationalizing Threat Intelligence
PDF
Cyber threat intelligence ppt
PPTX
Cyber Threat Intelligence | Information to Insight
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Threat Intelligence
Cyber Threat Intelligence
Threat Intelligence Workshop
Cyber Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Cyber threat intelligence ppt
Cyber Threat Intelligence | Information to Insight
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Threat Intelligence

What's hot (20)

PPTX
Cyber Threat Hunting Workshop
PDF
Introduction to Cybersecurity
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
Cybersecurity Roadmap Development for Executives
PPTX
IBM Security QRadar
PPTX
Cyber threat intelligence: maturity and metrics
PDF
Welcome to the world of Cyber Threat Intelligence
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
Global Cyber Threat Intelligence
PPTX
Cyber attacks and IT security management in 2025
PDF
MITRE ATT&CK Framework
PPTX
Cybersecurity Awareness Session by Adam
PPTX
Cybersecurity Risk Management Framework Strategy Workshop
PDF
Overview of the Cyber Kill Chain [TM]
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Building an Analytics - Enabled SOC Breakout Session
PDF
Building Security Operation Center
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Cyber kill chain
PPTX
Threat Hunting - Moving from the ad hoc to the formal
Cyber Threat Hunting Workshop
Introduction to Cybersecurity
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cybersecurity Roadmap Development for Executives
IBM Security QRadar
Cyber threat intelligence: maturity and metrics
Welcome to the world of Cyber Threat Intelligence
Threat Intelligence 101 - Steve Lodin - Submitted
Global Cyber Threat Intelligence
Cyber attacks and IT security management in 2025
MITRE ATT&CK Framework
Cybersecurity Awareness Session by Adam
Cybersecurity Risk Management Framework Strategy Workshop
Overview of the Cyber Kill Chain [TM]
From SIEM to SOC: Crossing the Cybersecurity Chasm
Building an Analytics - Enabled SOC Breakout Session
Building Security Operation Center
Effective Threat Hunting with Tactical Threat Intelligence
Cyber kill chain
Threat Hunting - Moving from the ad hoc to the formal
Ad

Similar to Threat Intelligence Data Collection & Acquisition (20)

PDF
IoT Malware Detection through Threshold Random Walks
PDF
AI: The New Player in Cybersecurity (Nov. 08, 2023)
PDF
Road map for actionable threat intelligence
PDF
Toward revealing Advanced Persistence Threats in your organization - Public
PPTX
Discover advanced threats with threat intelligence - Jeremy Li
PPTX
Crimeware Fingerprinting Final
PDF
IOCs Are Dead—Long Live IOCs!
PPTX
What's new in​ CEHv11?
PPTX
Futuristic data mining technologies for cyber security
PDF
Network security
PPT
3 Hkcert Trend
PDF
IBM Cyber Threat Analysis
PDF
ASCL_Syllabus_Project Report Details
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
PPT
SITA LAB PPT (XYBER CRIME)
PDF
ioThink Security Datasheet
PDF
ioThink Security Datasheet
PPT
Cyber crime & security final tapan
PPT
Owasp osint presentation - by adam nurudini
PPTX
Ethical Hacking
IoT Malware Detection through Threshold Random Walks
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Road map for actionable threat intelligence
Toward revealing Advanced Persistence Threats in your organization - Public
Discover advanced threats with threat intelligence - Jeremy Li
Crimeware Fingerprinting Final
IOCs Are Dead—Long Live IOCs!
What's new in​ CEHv11?
Futuristic data mining technologies for cyber security
Network security
3 Hkcert Trend
IBM Cyber Threat Analysis
ASCL_Syllabus_Project Report Details
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
SITA LAB PPT (XYBER CRIME)
ioThink Security Datasheet
ioThink Security Datasheet
Cyber crime & security final tapan
Owasp osint presentation - by adam nurudini
Ethical Hacking
Ad

More from EC-Council (20)

PPTX
Skills that make network security training easy
PPTX
Can Cloud Solutions Transform Network Security
PPTX
What makes blockchain secure: Key Characteristics & Security Architecture
PPTX
6 Most Popular Threat Modeling Methodologies
PPTX
Journey from CCNA to Certified Network Defender v2
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
PPTX
Red Team vs. Blue Team
PPTX
Types of Malware (CEH v11)
PDF
Why Threat Intelligence Is a Must for Every Organization?
PDF
Why Digital Forensics as a Career?
PPTX
Cryptography in Blockchain
PPTX
A Brief Introduction to Penetration Testing
PPTX
Computer Hacking Forensic Investigator - CHFI
PPTX
Pasta Threat Modeling
PPTX
Blockchain: Fundamentals & Opportunities​
PPTX
Cybersecurity Audit
PPTX
Third Party Risk Management
PPTX
Types of malware threats
PPTX
Business Continuity & Disaster Recovery
PPTX
Most Common Application Level Attacks
Skills that make network security training easy
Can Cloud Solutions Transform Network Security
What makes blockchain secure: Key Characteristics & Security Architecture
6 Most Popular Threat Modeling Methodologies
Journey from CCNA to Certified Network Defender v2
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Red Team vs. Blue Team
Types of Malware (CEH v11)
Why Threat Intelligence Is a Must for Every Organization?
Why Digital Forensics as a Career?
Cryptography in Blockchain
A Brief Introduction to Penetration Testing
Computer Hacking Forensic Investigator - CHFI
Pasta Threat Modeling
Blockchain: Fundamentals & Opportunities​
Cybersecurity Audit
Third Party Risk Management
Types of malware threats
Business Continuity & Disaster Recovery
Most Common Application Level Attacks

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PPTX
Institutional Correction lecture only . . .
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Classroom Observation Tools for Teachers
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
Institutional Correction lecture only . . .
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Pharma ospi slides which help in ospi learning
Classroom Observation Tools for Teachers
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Types and Its function , kingdom of life
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Insiders guide to clinical Medicine.pdf
Week 4 Term 3 Study Techniques revisited.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Business Ethics Teaching Materials for college
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
O7-L3 Supply Chain Operations - ICLT Program
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf

Threat Intelligence Data Collection & Acquisition